Confidentiality Information Security Sample Clauses

Confidentiality Information Security. All information and advice furnished by either party to the other (or obtained by the Sub-Adviser from the Company in connection with providing Services under this Agreement) shall be treated as confidential (“Confidential Information”) and shall not be disclosed to unaffiliated third parties unless requested by a regulatory authority or as otherwise required by law. Information to be treated as Confidential Information includes, without limitation, all “non-public personal information” as defined in Title V of the Xxxxx-Xxxxx Xxxxxx Act and its implementing regulations. The Sub-Adviser and its officers, directors, employees, agents and vendors shall not use the Adviser’s Confidential Information for any purpose other than to provide the Services contracted for in this Agreement for the sole benefit of the Adviser and the Company; provided, however, that the Sub-Adviser will not violate the foregoing if it uses the Adviser’s Confidential Information in connection with other written agreements entered into between the Sub-Adviser and the Adviser or the Adviser’s affiliates, for the sole benefit of the Adviser or its affiliates. The parties shall use appropriate measures to: (i) safeguard the security and confidentiality of Confidential Information; (ii) protect against the destruction, loss, alteration of or unauthorized access to Confidential Information; and (iii) ensure the proper disposal of Confidential Information. In the event that the Sub-Adviser becomes aware of an incident of unauthorized access to, compromise or breach of the Adviser and/or the Company’s Confidential Information, the Sub-Adviser shall immediately notify the Adviser of the incident and shall immediately coordinate with the Adviser to investigate and prevent the incident or mitigate or remedy the effects of the incident. The Sub-Adviser shall provide updates to the Adviser of the Sub-Adviser’s efforts to correct or prevent such compromise, as frequently as necessary to keep the Adviser fully apprised of the investigation and the status of any corrective or remedial steps taken by the Sub-Adviser.
AutoNDA by SimpleDocs
Confidentiality Information Security. (a) Each party shall keep confidential any information relating to the other party’s business (“Confidential Information”). Confidential Information shall include (a) any data or information that is competitively sensitive material, and not generally known to the public, including, but not limited to, information about product plans, marketing strategies, finances, operations, customer relationships, customer profiles, customer lists, sales estimates, business plans, and internal performance results relating to the past, present or future business activities of the Administrator, a Fund or BNY Mellon and their respective subsidiaries and affiliated companies; (b) any scientific or technical information, design, process, procedure, formula, or improvement that is commercially valuable and secret in the sense that its confidentiality affords a Fund or BNY Mellon a competitive advantage over its competitors; (c) all confidential or proprietary concepts, documentation, reports, data, specifications, computer software, source code, object code, flow charts, databases, inventions, know-how, and trade secrets, whether or not patentable or copyrightable; and (d) anything designated as confidential. Notwithstanding the foregoing, information shall not be Confidential Information and shall not be subject to such confidentiality obligations if it: (a) is already known to the receiving party at the time it is obtained; (b) is or becomes publicly known or available through no wrongful act of the receiving party; (c) is rightfully received from a third party who, to the best of the receiving party’s knowledge, is not under a duty of confidentiality; (d) is released by the protected party to a third party without restriction; (e) is requested or required to be disclosed by the receiving party pursuant to a court order, subpoena, governmental or regulatory agency request or law; (f) is relevant to the defense of any claim or cause of action asserted against the receiving party; (g) is Fund information provided by BNY Mellon in connection with an independent third party compliance or other review; (h) is released for Fund business purposes in connection with the provision of services to or for the Fund under this Agreement; or (i) has been or is independently developed or obtained by the receiving party. The provisions of this Section 21 shall survive termination of this Agreement for a period of one (1) year after such termination.
Confidentiality Information Security. (a) The Ceding Company and the Reinsurer agree to hold each other’s Confidential Information in strictest confidence and to take all reasonable steps to ensure that Confidential Information is not disclosed in any form by any means by such Party, its Affiliates or by any of its representative or subcontractors to third parties of any kind, other than the representatives performing services for such Party who need access to such Confidential Information in the course and scope of providing such services, except as is authorized by the other Party in advance and in compliance with all Applicable Law. If any Confidential Information needs to be disclosed as required by Applicable Law or court order, the disclosing Party shall (if permitted by Applicable Law) provide prompt notice to the other Party prior to such disclosure so that such other party may (at its expense) seek a protection order or other appropriate remedy which is necessary to protect its interest.
Confidentiality Information Security. Assent cannot be held responsible for information submitted by the customer and we do not vet, redact or censor content. However, Assent staff will avoid, as far as possible, including any personal or confidential information within the ticket responses. Further information on our Information Security Policy can be found on xxx.xxxxxx0.xxx.
Confidentiality Information Security. (a) Each parties agrees to keep confidential and not disclose to any third parties any information (in any form or medium, written or oral, and whether or not labeled or otherwise identified as confidential) given to or received from the other party, directly or indirectly, as a result of or in connection with performance under this Agreement (including the Exhibits hereto). The foregoing obligation of confidentiality does not apply to information which (i) is or becomes available to the public generally, other than as a result of disclosure by the receiving party, directly or indirectly, in breach of the terms of this Agreement, (ii) becomes available to the receiving party from a source other than the disclosing party, including without limitation prior to the date hereof, provided that such source is not (to the knowledge of the receiving party after reasonable inquiry) bound by a confidentiality agreement with or does not have a contractual, legal or fiduciary obligation of confidentiality to the disclosing party or any other person with respect to such information, or (iii) has been independently acquired or developed by the receiving party without using any information of the receiving party or violating any of its obligations under this Agreement, but the receiving party shall have the burden of proof to demonstrate such independence. Neither party will use any information of the other party that is subject to the foregoing obligation of confidentiality for its own benefit or the benefit of a third party, and will take all reasonable measures to protect the confidentiality of such information and prevent its disclosure to others.
Confidentiality Information Security. Users of the Einaudi Center information network systems, including computer, telephone, fax, printers and photocopiers as well as data storage devices, should have no expectation of privacy of information. The I:/Drive is provided to employees to facilitate storage of business-related sensitive data and should not be used as a private location for storage of personal and non-Cornell information. Confidentiality & Information Security Policy 5.10: xxxx://xxx.xxx.xxxxxxx.xxx/dfa/treasurer/policyoffice/policies/volumes/informationtech/infosecurity.cfm Policy 4.12: xxxx://xxx.xxx.xxxxxxx.xxx/dfa/treasurer/policyoffice/policies/volumes/governance/data.cfm Cornell University Policy 5.10 “Information Security of Institutional Information” defines the following information as Level 1 (confidential), Level 2 (restricted), or Level 3 (public):
Confidentiality Information Security a. Your company and its Affiliates and their respective Personnel will:
AutoNDA by SimpleDocs
Confidentiality Information Security. In addition to any other agreement and/or terms governing confidentiality between the parties, Service Provider will adopt adequate (taking into account the nature of Processing and the information available to Service Provider) technical and organizational measures reasonably necessary to secure the Personal Data and to prevent unauthorized access, alteration or loss of the same, including measures required by applicable Data Protection Laws. Service Provider will also ensure confidentiality of the Personal Data, including taking appropriate measures to ensure the same of its Personnel and Sub-processors. At the reasonable written request of FireEye, Service Provider will provide the former with a comprehensive and up-to-date data protection and security concept for the FireEye Personal Data obtained under the Agreement while performing the Services under the Agreement.
Confidentiality Information Security. (a) Your company and its Affiliates (as defined below) and their respective Personnel will: (i) protect and not disclose the terms of this Agreement and any other information that is identified as confidential or that reasonably should be considered confidential to Amazon regardless of when received (“Confidential Information”); (ii) use Confidential Information only to fulfill your company’s obligations under this Agreement; and
Confidentiality Information Security 
Time is Money Join Law Insider Premium to draft better contracts faster.